Sciweavers

24529 search results - page 340 / 4906
» Computing on Authenticated Data
Sort
View

Lecture Notes
570views
17 years 3 months ago
Data Structures and Algorithms
Data Structures and Algorithms
Y Narahari
FSE
2009
Springer
159views Cryptology» more  FSE 2009»
15 years 11 months ago
Intel's New AES Instructions for Enhanced Performance and Security
The Advanced Encryption Standard (AES) is the Federal Information Processing Standard for symmetric encryption. It is widely believed to be secure and efficient, and is therefore b...
Shay Gueron
ACSAC
2000
IEEE
15 years 8 months ago
Applications in Health Care using Public-Key Certificates and Attribute Certificates
Security infrastructures are increasingly used in the health care and welfare sector, particularly for providing security, like confidentiality, authenticity, integrity, nonrepudi...
Petra Wohlmacher, Peter Pharow
CN
2007
116views more  CN 2007»
15 years 4 months ago
Scalability and security in biased many-to-one communication
In multicast communication, a source transmits the same content to a set of receivers. Current protocols for multicast follow a tree communication model which makes them scalable....
Francesc Sebé, Josep Domingo-Ferrer
IPPS
2010
IEEE
15 years 2 months ago
Improving application performance with hardware data structures
Contemporary processors are becoming wider and more parallel. Thus developers must work hard to extract performance gains. An alternative computing paradigm is to use FPGA technolo...
Ravikesh Chandra, Oliver Sinnen